Computer network operations

Results: 408



#Item
231Military / War / Computer network operations / Hacking / Military technology / CNO / Information warfare / Computer science / Cyber Operations / Military science / Electronic warfare / Cyberwarfare

Developing a Reliable Methodology for Assessing the Computer Network Operations Threat of North Korea

Add to Reading List

Source URL: www.fas.org

Language: English - Date: 2014-05-06 20:16:30
232Computer security / Malware / Spamming / Whitelist / Software / McAfee / DriveSentry / Antivirus software / Security / Computer network security

CYBER SECURITY OPERATIONS CENTRE (UPDATED) AUGUST 2012 Application whitelisting explained 1.

Add to Reading List

Source URL: www.asd.gov.au

Language: English - Date: 2012-12-19 17:51:04
233Route assignment / Transportation planning / Network flow / Mathematical optimization / Frank–Wolfe algorithm / Flow network / Algorithm / Theoretical computer science / Operations research / Mathematics / Applied mathematics

Microsoft Word - Boyce, Ralevic-Dekic and Bar-Gera_internet_version _2004_..

Add to Reading List

Source URL: www.niss.org

Language: English - Date: 2005-10-18 13:25:32
234Computer security / Electronic warfare / Computer network operations / Hacking / Military technology / CNO / Threat / Attack / Cyber Operations / Computer network security / Cyberwarfare / Security

Microsoft Word - 05Sep_Patterson_Smith.doc

Add to Reading List

Source URL: www.fas.org

Language: English - Date: 2014-05-06 20:16:34
235Computer network security / Mitre Corporation / United States Department of Defense / Carnegie Mellon University / Cyberwarfare / Computer security / War / Security / Military science / National security

Ten Strategies of a World-Class Cybersecurity Operations Center

Add to Reading List

Source URL: www.mitre.org

Language: English - Date: 2014-10-01 09:24:16
236Cyberwarfare / Propaganda in the United States / Information warfare / Perception management / Psychological Operations / Cisco IOS / Computer network operations / Propaganda / Network-centric warfare / Military / War / Information operations

From Intelligence to Influence: The Role of Information Operations

Add to Reading List

Source URL: www.cfc.forces.gc.ca

Language: English - Date: 2013-12-12 15:28:16
237National security / Crime prevention / Computer network security / Software testing / Vulnerability / United States Department of Veterans Affairs / Information security / Security operations center / Security / Cyberwarfare / Computer security

GAO[removed]Highlights, Information Security: VA Needs to Address Identified Vulnerabilities

Add to Reading List

Source URL: www.gao.gov

Language: English - Date: 2014-11-17 09:30:22
238Computer network security / National security / Crime prevention / Espionage / Communications security / Classified information / Operations security / Threat / Internet privacy / Security / Cyberwarfare / Computer security

Print Form DOD STANDARD MANDATORY NOTICE AND CONSENT By signing this document, you acknowledge and consent that when you access Department of Defense (DOD) information systems:

Add to Reading List

Source URL: www.imcom.army.mil

Language: English - Date: 2014-11-14 13:30:02
239Lockheed Martin F-22 Raptor / Link 16 / United States Air Force / Joint Tactical Radio System / PM Warfighter Information Network-Tactical / NATO / Airborne Networking / Computer networking

USAF Scientific Advisory Board Study Airborne Networking and Communications for Contested Environments Study Abstract Current and future Air Force operations require robust airborne communications and data links to share

Add to Reading List

Source URL: www.sab.af.mil

Language: English - Date: 2014-11-04 12:47:12
240Computer network security / Crime prevention / National security / Software testing / Vulnerability / United States Department of Veterans Affairs / Security operations center / Information security / Security / Computer security / Cyberwarfare

GAO-15-220T Highlights, Information Security: Additional Actions Needed to Address Vulnerabilities That Put VA Data at Risk

Add to Reading List

Source URL: gao.gov

Language: English - Date: 2014-11-18 13:19:19
UPDATE